Feeds

Actual computer hacking by UK media: Suspect cuffed

Not just voicemail - proper technical stuff

5 things you didn’t know about cloud backup

An inquiry into computer hacking by the UK media resulted in the arrest of its first suspect, a 52-year-old from Milton Keynes.

The as-yet-unidentified middle-aged man was arrested on Thursday morning by officers from Scotland Yard as part of Operation Tuleta, an investigation into computer hacking by the press that is running parallel to other inquiries. These include unrelated phone voicemail interception investigations and an investigation into alleged tip-off payments to the police. The suspect was taken to a Thames Valley police station for questioning over alleged computer misuse offences.

"Operation Tuleta is investigating a number of allegations regarding breach of privacy, received by the Met since January 2011, which fell outside the remit of Operation Weeting, including computer hacking," a Scotland Yard statement explained.

Previously arrests of media executives and journalists, mostly individuals who worked for the now defunct News of the World, were made by officers from Operation Weeting – investigating mobile phone voicemail hacking – and Operation Elveden, an investigation into payments to the police by the media. ®

5 things you didn’t know about cloud backup

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?